tandasat / HelloIommuPkgLinks
The sample DXE runtime driver demonstrating how to program DMA remapping.
☆64Updated last year
Alternatives and similar repositories for HelloIommuPkg
Users that are interested in HelloIommuPkg are comparing it to the libraries listed below
Sorting:
- A simple and heavily documented series of test hypervisors built for 64-bit Windows 10 systems running under Intel's VT-x☆33Updated 4 years ago
- This is an instruction to run your own SMM code.☆109Updated 4 years ago
- Parser for Microsoft Program Database (PDB) files☆76Updated 5 years ago
- HelloAmdHvPkg is a type-1 research hypervisor for AMD processors.☆97Updated 5 years ago
- IntroVirt is an guest introspection library for KVM☆56Updated last year
- AMD SVM hypervisor rootkit proof of concept☆47Updated 2 years ago
- ☆68Updated 4 years ago
- Tool to dump UEFI runtime drivers implementing runtime services for Windows☆106Updated 4 years ago
- VT-based PCI device monitor (SPI)☆154Updated 4 years ago
- Fetch PDB symbols directly from Microsoft's symbol servers☆41Updated 3 years ago
- Open Course for diving security internal☆51Updated 5 years ago
- IA32-doc is a project which aims to put as many definitions from the Intel Manual into machine-processable format as possible☆17Updated 3 years ago
- Retrieve pointers to undocumented kernel functions and offsets to members within undocumented structures to use in your driver by using t…☆63Updated 6 years ago
- Header-only VMWare Backdoor API Implementation & Effortless VMX Patcher for Custom Guest-to-Host RPCs☆103Updated 4 years ago
- A native hypervisor designed for the Windows operating system☆124Updated 4 years ago
- Type 2 Hypervisor for security research supported by AMD-V hardware assisted virtualization☆40Updated 2 years ago
- Resolve DOS MZ executable symbols at runtime☆95Updated 3 years ago
- Automatically exported from code.google.com/p/virtdbg☆99Updated 10 years ago
- A simple x86_64 AMD-v hypervisor type-2 Programmed with C++, with soon to be added syscall hooks. [W.I.P]☆102Updated 2 years ago
- A simple hypervisor demonstrating the use of the Intel VT-rp (redirect protection) technology.☆110Updated last year
- This is the first software system, which can detect a stealthy hypervisor and calculate several nested ones even under countermeasures.☆84Updated 10 years ago
- A collection of tools, source code, and papers researching Windows' implementation of CET.☆85Updated 5 years ago
- An automatic tool for fixing dumped PE files☆41Updated 5 years ago
- The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303…☆142Updated 4 years ago
- Collection of obfuscation, tamper-proofing, and watermarking algorithms targeting LLVM IR.☆75Updated 5 years ago
- A library for intel VT-x hypervisor functionality supporting EPT shadowing.☆51Updated 4 years ago
- ☆93Updated 5 years ago
- A reflexive driver loader to bypass Windows DSE (featuring a custom PE loader)☆43Updated 7 years ago
- Runtime smm module loader☆36Updated 2 years ago
- Driver demonstrating how to register a DPC to asynchronously wait on an object☆50Updated 4 years ago